Converting an existing taxonomic data resource to employ an ontology and LSIDs.
Kennedy, J., Gales, R., & Kukla, R. (2006)
Converting an existing taxonomic data resource to employ an ontology and LSIDs. In L. Belbin, A. Rissoné, & A. Weitzman (Eds.), Proceedings of TDWG (2006), St Louis, MI
Data sharing is fundamental to biodiversity and taxonomic data applications, however previous attempts at developing mechanisms to facilitate sharing within the community have...
A Quantitative Field Study of a Persuasive Security Technology in the Wild
Vargheese, J. P., Collinson, M., & Masthoff, J. (2022)
A Quantitative Field Study of a Persuasive Security Technology in the Wild. In Social Informatics: 13th International Conference, SocInfo 2022, Glasgow, UK, October 19–21, 2022, Proceedings (211-232). https://doi.org/10.1007/978-3-031-19097-1_13
Persuasive techniques and persuasive technologies have been suggested as a means to improve user cybersecurity behaviour, but there have been few quantitative studies in this ...
Real-time anomaly intrusion detection for a clean water supply system, utilising machine learning with novel energy-based features
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., & Russell, G. (2020)
Real-time anomaly intrusion detection for a clean water supply system, utilising machine learning with novel energy-based features. In 2020 International Joint Conference on Neural Networks (IJCNN). https://doi.org/10.1109/IJCNN48605.2020.9207462
Industrial Control Systems have become a priority domain for cybersecurity practitioners due to the number of cyber-attacks against those systems has increased over the past f...
A refinement calculus for the development of real-time systems.
Chen, Z., Cau, A., Zedan, H., Liu, X., & Yang, H. (1998)
A refinement calculus for the development of real-time systems. In 5th Asia Pacific Software Engineering Conference, APSEC '98, 61. https://doi.org/10.1109/APSEC.1998.733588
We present a calculus which can transfer specifications
to objects for the development of real-time systems. The
object model is based on a practical OO development
The Design and Evaluation of a Modern C++ Library
Chalmers, K. (2016)
The Design and Evaluation of a Modern C++ Library. In Communicating Process Architectures 2016
Although many CSP inspired libraries exist, none yet have targeted modern C++ (C++11 onwards). The work presented has a main objective of providing a new C++ CSP library which...
IRIDiuM+: deep media storytelling with non-linear light field video
Kosek, M., Koniaris, B., Sinclair, D., Markova, D., Rothnie, F., Smoot, L., & Mitchell, K. (2017)
IRIDiuM+: deep media storytelling with non-linear light field video. In SIGGRAPH '17 ACM SIGGRAPH 2017 VR Village. https://doi.org/10.1145/3089269.3089277
We present immersive storytelling in VR enhanced with non-linear
sequenced sound, touch and light. Our Deep Media (Rose 2012) aim
is to allow for guests to physically enter re...
Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier
Hall, A. J., Pitropakis, N., Buchanan, W. J., & Moradpoor, N. (2019)
Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier. In 2018 IEEE International Conference on Big Data (Big Data)https://doi.org/10.1109/BigData.2018.8621922
Insider threats continue to present a major challenge for the information security community. Despite constant research taking place in this area; a substantial gap still exis...
Building timber gridshells with air: Numerical simulations and technique challenges
Liuti, A., D'Amico, B., & Pugnale, A. (2016)
Building timber gridshells with air: Numerical simulations and technique challenges. In P. J. S. Cruz (Ed.), Structures and Architecture: Beyond their Limits
Construction has always been a fascinating and challenging aspect of timber gridshells. So far, only three techniques have successfully been used for the erection of such stru...
Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach
Salayma, M., Al-Dubai, A., Romdhani, I., & Yassein, M. B. (2015)
Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach. In M. Ganzha, L. Maciaszek, & M. Paprzycki (Eds.), Proceedings of the 2015 Federated Conference on Computer Science and Information Systems, (1267-1272). https://doi.org/10.15439/2015F118
In Wireless Sensor Networks (WSNs), energy conservation is one of the main concerns challenging the cutting-edge standards and protocols. Most existing studies focus on the de...
Home automation: HMM based fuzzy rule engine for Ambient intelligent smart space
Singh Jamnal, G., Liu, X., & Fan, L. (2017)
Home automation: HMM based fuzzy rule engine for Ambient intelligent smart space. In Proceedings of The 29th International Conference on Software Engineering and Knowledge Engineering
In this paper, we proposed a new type of decision making system to achieve the intelligent goal for automated smart environments. The artificial intelligence techniques, used ...